Chosen-ciphertext security of multiple encryption

被引:0
|
作者
Dodis, Y
Katz, J
机构
[1] NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA
[2] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Encryption of data using multiple, independent encryption schemes ("multiple encryption") has been suggested in a variety of contexts, and can be used, for example, to protect against partial key exposure or cryptanalysis, or to enforce threshold access to data. Most prior work on this subject has focused on the security of multiple encryption against chosen-plaintext attacks, and has shown constructions secure in this sense based on the chosen-plaintext security of the component schemes, Subsequent work has sometimes assumed that these solutions are also secure against chosen-ciphertext attacks when component schemes with stronger security properties are used. Unfortunately, this intuition is false for all existing multiple encryption schemes. Here, in addition to formalizing the problem of chosen-ciphertext security for multiple encryption, we give simple, efficient, and generic constructions of multiple encryption schemes secure against chosen-cipher text attacks (based on any component schemes secure against such attacks) in the standard model. We also give a more efficient construction from any (hierarchical) identity-based encryption scheme secure against selective-identity chosen plaintext attacks. Finally, we discuss a wide range of applications for our proposed schemes.
引用
收藏
页码:188 / 209
页数:22
相关论文
共 50 条
  • [1] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [2] Chosen-ciphertext security from tag-based encryption
    Kiltz, Eike
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 581 - 600
  • [3] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [4] Relaxing chosen-ciphertext security
    Canetti, R
    Krawczyk, H
    Nielsen, JB
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 565 - 582
  • [5] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [6] Combiners for Chosen-Ciphertext Security
    Zhang, Cong
    Cash, David
    Wang, Xiuhua
    Yu, Xiaoqi
    Chow, Sherman S. M.
    [J]. COMPUTING AND COMBINATORICS, COCOON 2016, 2016, 9797 : 257 - 268
  • [7] Amplification of Chosen-Ciphertext Security
    Lin, Huijia
    Tessaro, Stefano
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 503 - 519
  • [8] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
    Weng, Jian
    Yang, Yanjiang
    Tang, Qiang
    Deng, Robert H.
    Bao, Feng
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 151 - +
  • [9] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [10] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110